Autors: Ivanova, M. S., Ilchov E.
Title: A Study on the Development of Quantum Cryptography and Some Challenging Issues
Keywords:

Abstract: Quantum cryptography is a revolutionary field that applies the principles of quantum mechanics to provide secure communication channels. One of the most popular techniques in quantum cryptography is Quantum Key Distribution, which uses quantum states to deliver secure keys. The main advantage of quantum cryptography is that it offers protection against eavesdropping and tampering, which is not possible with classical encryption methods. This is because copying data in a quantum state is virtually impossible, and any attempt to intercept or manipulate the data will result in its complete alteration. As a result, any third-party interference can be detected quickly. Traditional cryptographic algorithms used in modern cryptography are vulnerable to attacks due to the evolution of quantum computers and mathematical advances in the decomposition of large integers. Therefore, the solution to address this vulnerability is to apply the principles of quantum physics to cryptography. The aim of the paper is to survey the current scientific achievements in the field of quantum cryptography and to present some challenging issues.

References

  1. A. Perianes-Rodriguez, L. Waltman, and N. J. Van Eck, “Constructing bibliometric networks: A comparison between full and fractional counting,” Journal of Informetrics, 10(4), 1178-1195, 2016, https://doi.org/10.1016/j.joi.2016.10.006.
  2. J. Lin and T. Mor, “Quantum Candies and Quantum Cryptography,” In: Martín-Vide, C., Vega-Rodríguez, M.A., Yang, MS. (eds) Theory and Practice of Natural Computing. TPNC 2020. Lecture Notes in Computer Science, vol. 12494. Springer, Cham, https://doi.org/10.1007/978-3-030-63000-3_6.
  3. J. Wang, L. Liu, S. Lyu, et al., “Quantum-safe cryptography: crossroads of coding theory and cryptography,” Science China Information Sciences 65, 111301, 2022, https://doi.org/10.1007/s11432-021-3354-7.
  4. B. Muruganantham, P. Shamili, S. Ganesh Kumar, and A. Murugan, “Quantum cryptography for secured communication networks,” International Journal of Electrical and Computer Engineering (IJECE), 10(1), 407-414, 2020, ISSN: 2088-8708, DOI: 10.11591/ijece.v10i1.
  5. J. Ahn et al., “Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)” Energies, 15(3): 714, 2022, https://doi.org/10.3390/en15030714.
  6. E. Zeydan, Y. Turk, B. Aksoy and S. B. Ozturk, “Recent Advances in Post-Quantum Cryptography for Networks: A Survey,” 2022 Seventh International Conference On Mobile and Secure Services (MobiSecServ), Gainesville, FL, USA, 1-8, 2022, doi: 10.1109/MobiSecServ50855.2022.9727214.
  7. L. Cherkesova, D. Korochencev, E. Revyakina, N. Boldyrihin, and E. Roshchina, “Digitalization of the agroindustrial complex: analysis of existing vulnerabilities in quantum cryptography systems,” E3S Web of Conferences 175, 05026, INTERAGROMASH 2020, https://doi.org/10.1051/e3sconf/202017505026.
  8. D. Zoni, A. Galimberti and W. Fornaciari, “Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography,” in IEEE Access, vol. 8, 163419-163433, 2020, doi: 10.1109/ACCESS.2020.3020262.
  9. S. A. Käppler and B. Schneider, “Post-Quantum Cryptography: An Introductory Overview and Implementation Challenges of Quantum-Resistant Algorithms,” EPiC Series in Computing, vol. 84, 61-71, 2022, Proceedings of the Society 5.0 Conference 2022 - Integrating Digital World and Real World to Resolve Challenges in Business and Society.
  10. M. Kumar, “Post-quantum cryptography Algorithm’s standardization and performance analysis,” Array 15, 2022, https://doi.org/10.1016/j.array.2022.100242.
  11. C. Portmann and R. Renner, Security in quantum cryptography, Reviews of Modern Physics 94, 2022, https://doi.org/10.1103/RevModPhys.94.025008.
  12. J. Liñares, X. Prieto-Blanco, D. Balado, and G. M. Carral, “Fully autocompensating high-dimensional quantum cryptography by quantum degenerate four-wave mixing,” Physical Review A, 103(4), 2021, https://doi.org/10.1103/PhysRevA.103.043710.
  13. D. Bellizia et al., “Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design,” 2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Athens, Greece, 1-6, 2021, doi: 10.1109/DFT52944.2021.9568301.
  14. P. Nannipieri, S. Di Matteo, L. Zulberti, F. Albicocchi, S. Saponara and L. Fanucci, “A RISC-V Post Quantum Cryptography Instruction Set Extension for Number Theoretic Transform to Speed-Up CRYSTALS Algorithms,” in IEEE Access, vol. 9, 150798-150808, 2021, doi: 10.1109/ACCESS.2021.3126208.
  15. V. L. R. Costa, J. López, and M. V. Ribeiro. “A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications,” Sensors 22, no. 19: 7214, 2022, https://doi.org/10.3390/s22197214.
  16. M. Barbosa et al., “EasyPQC: Verifying Post-Quantum Cryptography,” CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 2564-2586, https://doi.org/10.1145/3460120.3484567.
  17. S. Pirandola, U. L. Andersen, L. Banchi, et al. “Advances in Quantum Cryptography. Advances in Optics and Photonics,” 12 (4). 1012-1236, 2020, ISSN 1943-8206, https://doi.org/10.1364/AOP.361502.
  18. F. Borges, P. R. Reis, and D. Pereira, “A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography,” in IEEE Access, vol. 8, 142413-142422, 2020, doi: 10.1109/ACCESS.2020.3013250.
  19. S. Salim, A. Quaium, S. Chellappan, and A. B. Islam, “Enhancing Fidelity of Quantum Cryptography using Maximally Entangled Qubits,” GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 1-6, 2020.
  20. V. K. Ralegankar et al., “Quantum Cryptography-as-a-Service for Secure UAV Communication: Applications, Challenges, and Case Study,” in IEEE Access, vol. 10, 1475-1492, 2022, doi: 10.1109/ACCESS.2021.3138753.
  21. M. Müller, J. de Jong, M. van Heesch, B. Overeinder, and R. van Rijswijk-Deij, “Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC,” ACM SIGCOMM Computer Communication Review, 50(426), 49-57, 2020, https://doi.org/10.1145/3431832.3431838.

Issue

AIP Conference Proceedings, vol. 3182, pp. 1-7, 2025, United States, https://doi.org/10.1063/5.0246142

Copyright AIP Publishing

Вид: публикация в международен форум, публикация в издание с импакт фактор, публикация в реферирано издание, индексирана в Scopus